Call Us: 1-866-802-9405

Category

Information Security Best Practices
Katie Arrington, DOD’s chief information security officer for the Office of the Undersecretary of Defense for Acquisition and Sustainment, recently announced the Cybersecurity Maturity Model Certification (CMMC) for NIST 800-171. In 2020, certification will be required to secure and renew government contracts.  CMMC certification requires an audit by an approved 3rd party to validate cybersecurity...
Read More
Prepare your Staff Let’s face it…there are no easy breaks in business.  And the malicious players are happy to exploit your employees at every turn.  The onslaught of emails and phone calls specifically designed to deceitfully extract money from your firm will not stop.  The most important thing you can do is prepare your staff.  ...
Read More
You don’t have to be a large company to be a (cyber) target; you can be a small to medium-sized company. “On average, it takes 244 days before a company realizes they were breeched,” says Rob Cote, President of Security Vitals. We often hear from executives who state that they have never been breached…to which...
Read More
In a lead-up to 2019’s Michigan Celebrates Small Business Gala Celebration, Jeffrey Mosher of the Michigan Business Network spoke with Security Vitals’ President Rob Cote as a 2019 Smartzone Best Small Business awardee. Listen to the Interview http://www.michiganbusinessnetwork.com/blog/smartzone-best-small-business-security-vitals  
Read More
A health care provider has closed unexpectedly due to a ransomware attack. ENT & Hearing Services in Battle Creek, Michigan, is the first health provider in the nation to close due to cybersecurity flaws. Since HIPAA is based on NIST 800-53, father to NIST 800-171, ENT & Hearing Services demonstrates the importance of maintaining diligence...
Read More
Welcome to part three of our 3-part series about security and compliance. For those of you who missed part one or two, feel free to follow these links to get up to speed on this series: Part 1: Related but Not the Same, and Part 2: Compliance Means We’re Secure, Right? In the previous two...
Read More
Welcome to part 2 in our 3 part series about security and compliance. For those of you who missed part one, feel free to give it a quick read here. When the need for compliance hits your organization, many things can be involved, such as hiring outside consultant help, purchasing new hardware and software, even...
Read More
Security Vitals will be collaborating with Merit Network, Inc.’s cyber range to conduct product reviews for SC Magazine Pontiac, MI – Security Vitals has been awarded a new contract with Haymarket Media, publisher of SC Magazine. After an extensive search and review process, Haymarket Media selected Security Vitals as the firm to conduct SC Magazine...
Read More
Welcome to part 1 of our 3 part series which dives into complicated relationship between security and compliance. There are many misconceptions about information security’s relation to compliance. Compliance does not equal a sophisticated information security system, nor does having a sophisticated security posture mean you are 100% compliant with a regulation or industry standard...
Read More
There is some confusion in the information technology industry at times between compliance and information security. Being compliant with a certain set of standard controls such as PCI DSS, HIPPA, or NIST 800-171, is completely different than having an effective information security posture. Compliance does not equal security, and in turn, security does not equal...
Read More
1 2 3